| Popular Security News |
| |Suspected Russian Hackers Impersonate State Department Aide WASHINGTON (AP) — U.S. cybersecurity experts say hackers impersonating a State Department official have targeted U.S. government agencies, businesses and think tanks in an attack that bears similarity to past campaigns linked to Russia.
| |SMS 2FA Database Leak Drama, MageCart Mishaps, Black Friday Badware, And More Plus, why is Kaspersky Lab getting into chess? Roundup What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…
| |Camp Fire’s Missing Person List Climbs To 1,011 As Statewide Death Toll Rises To 74 The number of names on the missing person's list for Northern California's
| |Black Friday 2018 Office Depot Deals: HP Laptop For $450, Chromebook For $130 - CNET This HP laptop (with a Core i7 CPU and 1TB hard drive) is one of the best computer deals weve seen.
| |Cancer Treatment Center Hit By Computer Hackers Health and insurance records for more than 128,000 patients and workers at a Capital Region cancer treatment center were potentially stolen this spring by computer hackers. New York Oncology Hematology reported Friday that hackers using...
| |Andrew Gillum Concedes Florida Gubernatorial Race To Ron DeSantis Andrew Gillum, the Democratic mayor of Tallahassee running for governor of
| |As Black Friday Approaches, Arm Yourself Against Cyber Scammers THE CHRISTMAS shopping bonanza will begin in earnest on Friday, with UK shoppers expected to spend as much as 4.5 billion in a single day. However, with more than half of these purchases likely to be made online, cyber scammers are likely...
| |Report: Charges Against Assange Relate To Russian Hacking Report: Charges Against Assange Relate To Russian Hacking
| Latest Security News |
| |New Vehicle Hack Exposes Users’ Private Data Via Bluetooth People who have synced their mobile phones with a wide variety of vehicle infotainment systems may have have their personal information exposed to a new type of vehicle hack, security researchers say.
| |Amazon Alexa Now Lets You Listen To Paid Pandora Premium Accounts - CNET Previously, Alexa only supported the free version with ads.
| |YouTube Now Has The Terminator, Legally Blonde And More Free Movies To Watch - CNET Grab the popcorn and tolerance for a few ads.
| |Ford Patent Application Cleverly Hides Lidar In Side Mirrors - Roadshow Maybe self-driving cars wont be covered in awkward jumble after all.
| |Black Friday Ads 2018: The Full Ads And Best Deals From Best Buy, Walmart, Target And More - CNET Want the unedited, full deal posts from the biggest retailers? Here they are -- along with when each sale starts.
| Latest News from Research Labs |
| |Cybersecurity A Big Concern In Canada As Cybercrime’s Impact Grows 90% of Canadians surveyed agreed that cybercrime was an important "challenge to the internal security of Canada"
The post Cybersecurity a big concern in Canada as cybercrime’s impact grows appeared first on WeLiveSecurity
| |Outlaw Group Distributes Botnet For Cryptocurrency-Mining, Scanning, And Brute-Force We spotted two variants of activities from hacking group Outlaw. The script used in the first version of its bot has two functionalities: the miner and Haiduc-based dropper. The second variant of the code, distributed by the bot, was mainly...
| |Exploring Emotet: Examining Emotet’s Activities, Infrastructure Discovered by Trend Micro in 2014, the banking Trojan Emotet has been brought back to life by malware authors last year with its own spamming module that has allowed it to spread, target new industries and regions, and evade sandbox and...
| |What’s New In Windows Defender ATP Across Windows Defender Advanced Threat Protection (Windows Defender ATP) engineering and research teams, innovation drives our mission to protect devices in the modern workplace. Our goal is to equip security teams with the tools and insights...
| |Security Researchers Bypass Encryption On Self-encrypting Drives Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification
The post Security researchers bypass encryption on self-encrypting drives appeared first on WeLiveSecurity
| Latest Security Videos & Podcasts |
| |Black Hat Arsenal Asia 2019 CFT Open The Black Hat Arsenal team will be back in Singapore with the very same goal: give hackers security researchers the opportunity to demo their newest and latest code. The Arsenal tool demo area...[[ This is a content summary only. Visit...
| |Black Hat Arsenal Europe 2018 Lineup Announced After days of reviewing the hundreds of submitted tools, ToolsWatch and Black Hat teams selected 50 tools. They will be demonstrated over 2 days the 5th and 6th of December 2018 at the Excel London...[[ This is a content summary only. Visit...
| |HITB Armory – Call For Tools Is OPEN! (Dubai, UAE) Were pleased to announce the first ever HackInTheBox Armory! The HITB Armory is where you can showcase your security tools to the world. You will get 30 minutes to present your tools onstage,...[[ This is a content summary only. Visit my...
| |Blackhat Arsenal Europe 2018 CFT Open The Black Hat Arsenal team is heading to London with the very same goal: give hackers security researchers the opportunity to demo their newest and latest code. The Arsenal tool demo area is...[[ This is a content summary only. Visit my...
| |Recon Village @ DEFCON 2018 (Hackathon) ToolsWatch likes open source tools, for that reason we will participate in the Recon Village @ DEF CON 2018 as part of jury. Maxi Soler will be there 🙂 Recon Village is an Open Space with Talks,...[[ This is a content summary only. Visit...
| Latest Security Papers & Presentations |
| |[dos] Microsoft Edge Chakra - OP_Memset Type Confusion Microsoft Edge Chakra - OP_Memset Type Confusion
| |[local] HTML Video Player 1.2.5 - Buffer-Overflow (SEH) HTML Video Player 1.2.5 - Buffer-Overflow (SEH)
| |[dos] XMPlay 3.8.3 - .m3u Denial Of Service (PoC) XMPlay 3.8.3 - .m3u Denial of Service (PoC)
| |CylancePROTECT – Product Overview Malicious code can have a devastating effect on organizations. This has been clearly demonstrated again and again in recent cases such as the ransomworm WannaCry, which in 2017 exploited the...Go on to the site to read the full article
| |The Cloud Browser Discussions around personal privacy are becoming louder and more complicated, while many countries are trying to get a grip on social networks and on the challenges presented by encrypted Web...Go on to the site to read the full...